$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/60
출원번호 US-0977687 (1997-11-24)
발명자 / 주소
  • Rusnak David J.
  • Zientara John T.
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Morgan & Finnegan, L.L.P.Redmond, Jr.
인용정보 피인용 횟수 : 229  인용 특허 : 13

초록

A system and method for limiting access to and preventing unauthorized use of an owner's digital content stored in an information network and available to clients under authorized conditions. The network includes at least one server coupled to a storage device for storing the limited access digital

대표청구항

[ We claim:] [1.] In a distributed information system, apparatus for limiting access to an owner's digital content, comprising;a) means for storing the owner's content in a document within a digital container and encrypting the document in a Document Encryption Key (DEK);b) a secure server coupled t

이 특허에 인용된 특허 (13)

  1. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  2. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  3. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  4. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  5. Rosen Sholom S. (New York NY), Electronic ticket presentation and transfer method.
  6. Rosen Sholom S. (New York NY), Method for acquiring and revalidating an electronic credential.
  7. Rosen Sholom S., Method for electronic merchandise dispute resolution.
  8. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets.
  9. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  10. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  11. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  12. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  13. Rosen Sholom S. (New York NY), Trusted agents for open electronic commerce.

이 특허를 인용한 특허 (229)

  1. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  2. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  3. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  4. Groth, Noah; Boyadjiev, Krassimir, Administration of data encryption in enterprise computer systems.
  5. Lee,Jae Seung; Moon,Ki Young; Park,Chee Hang, Apparatus and method for detecting illegitimate change of web resources.
  6. Russ, Samuel H.; Gaul, Michael A.; Wasilewski, Anthony J.; Pinder, Howard G., Apparatus for entitling and transmitting service instances to remote client devices.
  7. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  8. Agarwal,Sachin; Lee,Michele C., Automatic configuration of attribute sets.
  9. Robert, Arnaud; Alkove, James M.; Hofmeyr, Jan M., Binding content to an entity.
  10. Tung Loo,Elise Y.; Lee,Chi Cheng; Agarwal,Sachin, Blocking cache flush requests until completing current pending requests in a local server and remote server.
  11. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  12. Ross,David Justin; Love,Jack; Billester,Stephen E. M.; Smith,Brent R., Controlled-access database system and method.
  13. Challener, David Carroll; Cromer, Daryl Carvis; Davis, Mark Charles; Desai, Dhruv Manmohandas; Kaufman, Charles William; Ovies, Hernando; Ward, James Peter, Data processing system and method for protecting data in a hard drive utilizing a signature device.
  14. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  15. Patterson, Patrick E., Delivering electronic content.
  16. Patterson, Patrick E., Delivering electronic content.
  17. Patterson, Patrick E., Delivering electronic content.
  18. Patterson,Patrick E., Delivering electronic content.
  19. Patterson,Patrick E., Delivering electronic content.
  20. Delany,Shawn P.; Ahmed,Sajeed, Determining a user's groups.
  21. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Determining group membership.
  22. Russ, Samuel H.; Stallings, Christopher L., Digital media device having media content transfer capability.
  23. Kisters, Friedrich, Distributed data storage device.
  24. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  25. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  26. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  27. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  28. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  29. Sinn, Richard P.; Teng, Joan C.; Remahl, Thomas B., Employing electronic certificate workflows.
  30. Sinn, Richard P., Employing job code attributes in provisioning.
  31. Agarwal,Sachin; Remahl,Thomas; Teng,Joan, Employing local data stores to maintain data during workflows.
  32. Sinn, Richard; Yuen, Stan; Lee, Chi-Cheng, Employing wrapper profiles.
  33. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  34. Sharif, Imran; Knapp, William; Rahman, Tawhidur; Ivey, Glen Edward; Bremsteller, John, Fax-compatible internet appliance.
  35. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  36. Rossmann, Alain, Hybrid systems for securing digital assets.
  37. Delaney, Shawn P.; Summers, Robert, Identifying dynamic groups.
  38. Delaney,Shawn P.; Summers,Robert, Identifying dynamic groups.
  39. Villavicencio, Francisco J., Impersonation in an access system.
  40. Villavicencio,Francisco J., Impersonation in an access system.
  41. Kinser, Stephen Hugh; Burch, Lloyd Leon; Morris, Cameron Craig, Implicit trust of authorship certification.
  42. Felsher, David Paul, Information record infrastructure, system and method.
  43. Hayashi, Nobuhiro; Fukuyama, Munekatsu, Information recording medium and information processing device.
  44. de Jong,Eduard K., Interleaved data and instruction streams for application program obfuscation.
  45. Hodges, Jeffrey D., Intrusion threat detection.
  46. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  47. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  48. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  49. Rajasekaran, Sanguthevar; Hird, Geoffrey R.; Kausik, Balas Natarajan, Method and apparatus for camouflaging of data, information and functional transformations.
  50. Nayshtut, Alex; Ben-Shalom, Omer; Smith, Ned M.; Jimison, Jr., Edward V.; Khosravi, Hormuzd M., Method and apparatus for cloud-assisted cryptography.
  51. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  52. Allen, Robert; Jerdonek, Robert A.; Wang, John; Wu, Tom, Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys.
  53. Allen, Robert; Jerdonek, Robert A.; Wang, John; Wu, Tom, Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys.
  54. Allen, Robert; Jerdonek, Robert A.; Wang, John; Wu, Tom, Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys.
  55. Vora, Kumar; Raman, Rajesh; Ramamurthy, Prakash; Swadi, Praveen R.; Shandony, Michael J.; Joshi, Vrinda S.; Moatazedi, Shahram; Stone, Adam C., Method and apparatus for implementing a corporate directory and service center.
  56. Vora,Kumar; Raman,Rajesh; Ramamurthy,Prakash; Swadi,Praveen R.; Shandony,Michael J.; Joshi,Vrinda S.; Moatazedi,Shahram; Stone,Adam C., Method and apparatus for implementing a corporate directory and service center.
  57. Sullivan, Patrick L., Method and apparatus for in-line serial data encryption.
  58. Samar Vipin, Method and apparatus for managing trusted certificates.
  59. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  60. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  61. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  62. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  63. Hird, Geoffrey R., Method and apparatus for secure cryptographic key generation, certification and use.
  64. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  65. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  66. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  67. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  68. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  69. Wankmueller, John, Method and system for authorizing a transaction using a dynamic authorization code.
  70. Adams,Thomas Lee, Method and system for calling line authenticated key distribution.
  71. O'Toole, Jr., James W., Method and system for digital rights management brokering and digital asset security transcoding.
  72. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  73. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  74. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  75. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  76. Vainstein, Klimenty, Method and system for managing security tiers.
  77. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  78. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  79. Nath, Satyajit, Method and system for providing document retention using cryptography.
  80. Nath, Satyajit, Method and system for providing document retention using cryptography.
  81. Heiden, Richard W.; Weiant, Jr., Monroe A., Method and system for revocation of certificates used to certify public key users.
  82. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  83. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  84. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  85. Ranghuram, Yeluri; Orrin, Steve; Munoz, Alberto J., Method and system to securely migrate and provision virtual machine images and content.
  86. Lotspiech, Jeffrey Bruce; Naor, Dalit; Naor, Simeon, Method for broadcast encryption and key revocation of stateless receivers.
  87. Lotspiech,Jeffrey Bruce; Naor,Dalit; Naor,Simeon, Method for broadcast encryption and key revocation of stateless receivers.
  88. Henaff,Mari Mai; Aubertin,Laurent, Method for controlling access to internet sites.
  89. Lotspiech, Jeffrey Bruce; Naor, Dalit; Nin, Sigfredo Ismael; Pestoni, Florian, Method for ensuring content protection and subscription compliance.
  90. Havemose,Allan, Method for managing interaction between information appliances and appliance services.
  91. Lotspiech,Jeffrey Bruce; Naor,Dalit; Naor,Simeon, Method for tracing traitor receivers in a broadcast encryption system.
  92. Kuenzi, Adam; Chapin, Ron, Method of distributing stand-alone locks.
  93. Quinlan, Sean Michael; Lohman, Kevin Charles; Somani, Haniff; Barker, Peter Maximilian, Method of operating a computing device, computing device and computer program.
  94. Quinlan, Sean Michael; Lohman, Kevin Charles; Somani, Haniff; Barker, Peter Maximilian, Method of operating a computing device, computing device and computer program.
  95. Quinlan, Sean Michael; Lohman, Kevin Charles; Somani, Haniff; Barker, Peter Maximilian; Van Someren, Nicholas Benedict, Method of operating a computing device, computing device and computer program.
  96. Bellamy, Rachel K. E.; Malkin, Peter K., Method of requesting a customized instance of an object using information contained within an existing instance.
  97. Foster, Eric M.; Lotspiech, Jeffrey B.; Naor, Dalit; Nin, Sigfredo I.; Pestoni, Florian; Plouffe, Jr., Wilfred E.; Schaffa, Frank A., Method, system and program product for modifying content usage conditions during content distribution.
  98. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  99. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title protocol, authentication, and sharing.
  100. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title structure and management.
  101. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title structure and management.
  102. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  103. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  104. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  105. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  106. Yan, Paul D; Vorachart, Thitikun, Methods and systems to modify a two dimensional facial image to increase dimensional depth and generate a facial image that appears three dimensional.
  107. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods of facilitating merchant transactions using a computerized system including a set of titles.
  108. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods of facilitating merchant transactions using a computerized system including a set of titles.
  109. Malaviarachchi, Rushmi U.; Kamat, Mayur; Cross, David B., Multi-factor content protection.
  110. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  111. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  112. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  113. de Jong,Eduard K., Multiple instruction dispatch tables for application program obfuscation.
  114. Janes,Sherman M., Network communications security agent.
  115. Janes,Sherman M., Network communications security agent.
  116. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  117. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  118. Alon Cohen IL, Network vaults.
  119. de Jong,Eduard K., Non-linear execution of application program instructions for application program obfuscation.
  120. Sinn,Richard P., Obtaining and maintaining real time certificate status.
  121. Graveline, Marc; Roy, Patrick; Viney, Ulf, Opaque cryptographic web application data protection.
  122. Ghatare,Sanjay P., Partitioning data access requests.
  123. de Jong,Eduard K., Permutation of opcode values for application program obfuscation.
  124. Huded, Ashok V., Platform and method for creating and using a digital container.
  125. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Policies for modifying group membership.
  126. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  127. Tsang,Andy; Barber,Brandon, Portal bridge.
  128. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  129. Lee, Michele C., Preparing output XML based on selected programs and XML templates.
  130. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  131. Madden, David H., Protocol for controlling access to encryption keys.
  132. Madden, David H., Protocol for controlling access to encryption keys.
  133. Joshi,Vrinda S.; Thiyagarajan,Lakshmi Velandai, Providing data to applications from an access system.
  134. Teng,Joan C.; Lee,Chi Cheng, Proxy system.
  135. de Jong, Eduard K., Rendering and encryption engine for application program obfuscation.
  136. Jin, Hongxia; Lotspiech, Jeffrey Bruce; Nin, Sigfredo Ismael, Renewable traitor tracing.
  137. Roever, Stefan; Watson, David, Rights based system.
  138. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  139. Roever, Stefan; Watson, David, Rights-based system.
  140. Sinn,Richard P.; Remahl,Thomas B.; Tsang,Andy M., Rule based data management.
  141. Delany,Shawn P.; Ahmed,Sajeed, Runtime modification of entries in an identity system.
  142. Belknap,William R.; Brew,Glenn E.; Lotspiech,Jeffrey B.; Nusser,Stefan; Westerink,Peter, Secure IP based streaming in a format independent manner.
  143. Schlarb, John M.; Bacon, Kinney C., Secure escrow and recovery of media device content keys.
  144. Pauker, Matthew J.; Kacker, Rishi R.; Spies, Terence; Ryan, Lucas C.; Appenzeller, Guido, Secure message system with remote decryption service.
  145. Pauker, Matthew J.; Kacker, Rishi R.; Spies, Terence; Ryan, Lucas C.; Appenzeller, Guido, Secure message system with remote decryption service.
  146. Pauker,Matthew J.; Kacker,Rishi R.; Spies,Terence; Ryan,Lucas C.; Appenzeller,Guido, Secure message system with remote decryption service.
  147. Cheng,Li Te, Secure resource distribution through encrypted pointers.
  148. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  149. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  150. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  151. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  152. Venters, III,Carl Vernon; Phillips, II,Eugene B.; Ornstein,Seth, Secure streaming container.
  153. Ventors, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  154. Maino, Fabio R.; Monclus, Pere; McGrew, David A.; Bell, Robert T.; Rich, Steven Joseph, Secure virtual machine bootstrap in untrusted cloud infrastructures.
  155. Ross, David Justin; Love, Jack; Billester, Stephen E. M.; Smith, Brent R., Secure, limited-access database system and method.
  156. Garcia,Denis Jacques Paul, Secured data format for access control.
  157. Lee,Michele C.; Ahmed,Sajeed, Securely persisting network resource identifiers.
  158. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  159. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  160. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  161. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  162. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  163. Phillips, II,Eugene B.; Ornstein,Seth, Securing digital content system and method.
  164. Pinder, Howard G.; Maholski, Andrew D., Securing media content using interchangeable encryption key.
  165. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  166. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  167. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  168. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  169. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  170. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  171. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  172. Guo, Wei Quiang Michael; Howard, John Hal; Chan, Kok Wai, Session key security protocol.
  173. Guo, Wei-Quiang Michael; Howard, John Hal; Chan, Kok Wai, Session key security protocol.
  174. Kanevsky, Dimitri; Sabath, Mariusz; Sedivy, Jan; Zlatsin, Alexander, Smart book.
  175. Kanevsky,Dimitri; Sabath,Mariusz; Sedivy,Jan; Zlatsin,Alexander, Smart book.
  176. Collins, Kevin; Haven, Richard C.; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; OKelley, Brian, Software, systems, and methods for processing digital bearer instruments.
  177. Collins, Kevin; Haven, Richard; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; O'Kelly, Brian, Software, systems, and methods for processing digital bearer instruments.
  178. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  179. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  180. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  181. Lee, Chi-Cheng; Tsang, Andy M.; Remahl, Thomas B., Support for multiple data stores.
  182. Agarwal,Sachin; Thiyagarajan,Lakshmi V., Support for multiple mechanisms for accessing data stores.
  183. Kohler, Johan; Nandakumar, Bharathwaj, System and method for creating and streaming augmented game sessions.
  184. Lynch, Eric James; Kanouse, Darryl, System and method for generating personalized messaging campaigns for video game players.
  185. Curley, Jeffrey C.; Kerby, Paul; Lin, Calvin; Hampton, Edward Alexander; Haile, Paul R., System and method for identifying spawn locations in a video game.
  186. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  187. Sharif,Imran; Kadir,Noor A; Ivey,Glen Edward; Waseq,Noman; Knapp,William; Bremsteller,John, System and method for internet appliance data entry and navigation.
  188. Tresser,Charles P., System and method for maintaining customer privacy.
  189. Tresser,Charles P., System and method for maintaining customer privacy.
  190. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  191. Schmeling,Garth F.; Cherry,Darrel D., System and method for providing customized secure access to shared documents.
  192. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  193. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  194. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  195. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  196. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  197. Stirling, Spencer D., System and method for reading graphically-encoded identifiers from physical trading cards through image-based template matching.
  198. Marr, Michael D.; Kaplan, Keith S., System and method for replaying video game streams.
  199. Wilding, Mark F.; Horman, Randall W., System and method for secure remote access.
  200. Wilding,Mark F.; Horman,Randall W., System and method for secure remote access.
  201. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  202. Wang,Xin, System and method for transferring the right to decode messages.
  203. Condrey, Michael; Rubin, Mark, System and method for transparently styling non-player characters in a multiplayer video game.
  204. Linden, John P.; Watkins, III, James R.; Medeiros, Ryan H.; Marr, Michael D.; Pasteris, Paul G., System and method for uniquely identifying physical trading cards and incorporating trading card game items in a video game.
  205. Sharif,Imran; Husain,Shabbir Syed; Chakraborty,Pijush, System and method for using an internet appliance to send/receive digital content files as E-mail attachments.
  206. De La Cruz, Allen Joseph, System and method of generating and providing interactive annotation items based on triggering events in a video game.
  207. Marr, Michael D.; Kaplan, Keith S., System and method of inferring user interest in different aspects of video game streams.
  208. Kothari, Pravin; Gorantla, Malakondayya, System and method to anonymize data transmitted to a destination computing device.
  209. Natsuno, Takeshi; Yamamoto, Masaaki; Washio, Satoshi; Kawabata, Hiroshi, System for managing program applications storable in a mobile terminal.
  210. Natsuno, Takeshi; Yamamoto, Masaaki; Washio, Satoshi; Kawabata, Hiroshi, System for managing program applications storable in a mobile terminal.
  211. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  212. Friedman, Solomon, System, method and apparatus for establishing privacy in internet transactions and communications.
  213. Prus, Bohdan S.; Russ, Samuel H., Systems and methods for prioritizing the storage location of media data.
  214. Fraser, Stuart A.; Ginsberg, Philip M.; Kirwin, Glenn D.; Lutnick, Howard W., Systems and methods for reselling electronic merchandise.
  215. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  216. Teng, Joan C., Template based workflow definition.
  217. Peden, George H.; Marshall, Robert A., Ticketing and keying for orchestrating distribution of network content.
  218. Peden,George H.; Marshall,Robert A., Ticketing and keying for orchestrating distribution of network content.
  219. Collins, Kevin; Roever, Stefan; Wray, Kevin; Clark, Alex F.; Ginter, Karl, Title materials embedded within media formats and related applications.
  220. Roever, Stefan; Ginter, Karl, Title-enabled networking.
  221. Patterson, Patrick E., Tracking electronic content.
  222. Patterson, Patrick E., Tracking electronic content.
  223. Mourad,Magda M.; Munson,Jonathan P.; Nadeem,Tamer; Pacifici,Giovanni; Pistoia,Marco; Youssef,Alaa S., Transparent digital rights management for extendible content viewers.
  224. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  225. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  226. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  227. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  228. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  229. Pinder, Howard G.; Wasilewski, Anthony J.; Mattox, Mark D., Validating client-receivers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로